General

  • Target

    2024-05-17_a5afce7980c818a4327b89883e7b930a_cryptolocker

  • Size

    80KB

  • MD5

    a5afce7980c818a4327b89883e7b930a

  • SHA1

    b0163f5d0d7b147c5d66a156e6c0b7a5712eea7f

  • SHA256

    f3e656dadcb4308f709a1bb0c492388893f89dbda4f6a4c17845a1cffa7fd05f

  • SHA512

    27721a3cbc8cd192f697674cf10aa590e224e6acfde92c0252cc341cf323bbd0631b53ceaaf42ef7fec0c16d78a76defa4aa47d4d6a790a459599d2bfd3f155d

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOA+YSafiPuqdv:T6a+rdOOtEvwDpjNcq

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-17_a5afce7980c818a4327b89883e7b930a_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections